Unlock instant, AI-driven research and patent intelligence for your innovation.

Electronic key registration method and electronic key registration system

a technology of electronic keys and registration methods, applied in the field of electronic key registration methods and electronic key registration systems, can solve the problems of unauthentic electronic keys and inability to additionally register electronic keys at a later date, and achieve the effect of avoiding unauthorised electronic keys

Active Publication Date: 2016-07-19
KK TOKAI RIKA DENKI SEISAKUSHO
View PDF19 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This approach ensures secure and easy registration of electronic keys, preventing unauthorized access and eliminating the need for simultaneous shipping of electronic keys and controllers, while allowing for flexible key management.

Problems solved by technology

However, when the vehicle ID is tampered with, the controller would determine that an unauthentic electronic key is the authentic electronic key.
Although the controller and the electronic key could be shipped together, this is complicated.
Further, an electronic key cannot be additionally registered at a later date.
This problem is not limited to electronic key systems used for vehicles.
An electronic key system for use with a building such as a house has the same problem.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Electronic key registration method and electronic key registration system
  • Electronic key registration method and electronic key registration system
  • Electronic key registration method and electronic key registration system

Examples

Experimental program
Comparison scheme
Effect test

first embodiment

[0039]An electronic key registration system applied to a vehicle according to the first embodiment of the present invention will now be described with reference to FIGS. 1 to 5.

[0040]As shown in FIG. 1, a vehicle 1 includes an immobilizer system 3 that performs ID verification with an electronic key 2 through, for example, near field communication (radio communication in which the communication distance is approximately a few centimeters). The electronic key 2 includes an ID tag, which is a so-called transponder 4. In the immobilizer system 3, the transponder 4 is activated with a driving radio wave, which is transmitted from a coil antenna 5 of the vehicle 1. Then, ID verification is performed based on an ID code signal, which is transmitted from the transponder 4. The vehicle 1 is one example of a communication subject. The immobilizer system 3 is one example of an electronic key system.

[0041]The vehicle 1 includes an immobilizer ECU 6, which controls the immobilizer system 3. The...

second embodiment

[0107]An electronic key registration system applied to a vehicle according to a second embodiment of the present invention will now be described with reference to FIGS. 1 and 6 to 9. The electronic key registration system of the second embodiment generates the encryption key using the vehicle ID (VID), to which a random number is added, and the encryption key generation code (SC) when generating the encryption key with the second key generation logic g. This point differs from the first embodiment. Here, the description will focus on the differences from the first embodiment. The electronic key registration system of the second embodiment has the same structure as the electronic key registration system 7 of the first embodiment shown in FIG. 1.

[0108]A registration operation of the electronic key 2 to the immobilizer ECU 6 performed by the electronic key registration system 7 will now be described. Here, only a case in which the electronic key 2 is additionally registered and a case ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for registering first and second electronic keys, which are capable of controlling a communication subject, to a controller of the communication subject, wherein the first electronic key is to be initially registered, and the second electronic key is to be additionally registered, the method including: performing an additional key production process including storing, in the second electronic key, an additional encryption key generation code unique to the second electronic key and an additional encryption key that is used to verify the second electronic key; and performing a key additional registration process including obtaining the additional encryption key generation code from the second electronic key when identification information unique to the communication subject is stored in the second electronic key, generating the additional encryption key with an additional encryption key generation logic, and storing the additional encryption key in the controller.

Description

TECHNICAL FIELD[0001]The present invention relates to an electronic key registration method and an electronic key registration system that register an electronic key to a controller of a communication subject.BACKGROUND ART[0002]Conventionally, a known electronic key system performs radio communication between an electronic key, which a user of a vehicle carries, and the vehicle and performs the locking or unlocking of a vehicle door and the starting or stopping of the engine when verification of the electronic key is successful. In such electronic key systems, communication between the electronic key and the vehicle needs to be protected in order to ensure security. Thus, in the electronic key system, encrypted communication is performed between the electronic key and the vehicle (for example, refer to patent document 1). In the encrypted communication, contents of communication are encrypted to ensure high confidentiality.[0003]As the above encrypted communication, the common key ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(United States)
IPC IPC(8): H04L9/08G06F21/44H04L9/32B60R25/24G07C9/00
CPCH04L9/0861B60R25/24G06F21/44H04L9/0897H04L9/3271G07C9/00857H04L9/0816H04L9/0866H04L9/0869H04L2209/84
Inventor IWASHITA, HIROAKIKAWAI, HIDEKIEGAWA, TETSUYAHAYASHI, MASAKINAGAE, TOSHIHIROKAWAMURA, DAISUKE
Owner KK TOKAI RIKA DENKI SEISAKUSHO